首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

Research on Mechanisms of Credential Disclosure in ATN

摘要第5-6页
Abstract第6-7页
Chapter 1 Introduction第10-19页
    1.1 Background and Significance of the Research第10-11页
    1.2 Current Research Status第11-17页
        1.2.1 Minimum Credential Disclosure during ATN第11-14页
        1.2.2 Privacy Protection during ATN第14-17页
        1.2.3 TrustBuilder2 Framework第17页
    1.3 Research Content第17-18页
    1.4 Thesis Organization第18-19页
Chapter 2 Overview of Automated Trust Negotiation第19-25页
    2.1 ATN and its Main Issues第19-22页
        2.1.1 ATN Architecture and Model第19-20页
        2.1.2 Negotiation Strategy第20页
        2.1.3 Access Control Policy and Digital Credential第20-21页
        2.1.4 Policy Language第21页
        2.1.5 Negotiation Efficiency and Success Rate第21-22页
        2.1.6 Compliance Checker第22页
    2.2 Introduction to Existing ATN System第22-23页
    2.3 Evaluation of Performance Parameters in ATN System第23-24页
        2.3.1 Negotiation Complexity第23-24页
        2.3.2 Negotiation Success Rate第24页
        2.3.3 Negotiation Efficiency第24页
    2.4 Summary第24-25页
Chapter 3 Strategy for Minimum Credential Disclosure and Its Integration with TrustBuilder2Framework第25-52页
    3.1 TrustBuilder2 Architectural Overview第25-30页
        3.1.1 Data Types and Communication Protocol第25-27页
        3.1.2 Software Architecture第27-30页
    3.2 Default Configuration and Extensibility第30页
    3.3 Making TrustBuilder2 Workable for the Experiment第30-38页
        3.3.1 Defining the Configuration file第31-33页
        3.3.2 Integrating TrustBuilder2 with Java Application第33-38页
    3.4 Digital Credential Standard第38-41页
        3.4.1 PGP Digital Credential第38-40页
        3.4.2 X.509 Standard第40-41页
    3.5 Analysis of Minimum Credential Disclosure and its Advantage in ATN第41-42页
    3.6 Integrated Digital Credential for TrustBuilder2第42-50页
        3.6.1 Protocols for the Integrated Digital Credentials第43-44页
        3.6.2 CLOUSEAU Compliance Checke第44-47页
        3.6.3 Integrated Credential第47-50页
    3.7 Summary第50-52页
Chapter 4 Preserving Privacy during ATN第52-60页
    4.1 Information Leakage in ATN第52-54页
        4.1.1 Sensitive Access Control Policies第53页
        4.1.2 Possession Sensitive Credentials第53-54页
    4.2 RT Credentials and Policies第54页
    4.3 Associating Disclosure Policy within Digital Credential第54-57页
        4.3.1 Policy Definition for Credential第55-57页
    4.4 Redefining IOManipulationModule Module第57-59页
    4.5 Summary第59-60页
Chapter 5 Experiment Results and Analysis第60-68页
    5.1 The Scenario第60-63页
    5.2 The Experiments第63-64页
    5.3 Result第64-67页
        5.3.1 Impact of Credentials Integration in Average Time conducting ATN第65-66页
        5.3.2 Impact of Credentials Integration in Space Occupied on Disk第66-67页
    5.4 Summary第67-68页
Conclusion第68-70页
References第70-74页
Publication第74-75页
Acknowledgement第75页

论文共75页,点击 下载论文
上一篇:深网查询接口模式识别与分类方法的研究
下一篇:公益诉讼起诉问题研究